Dynamic Proxy Selection for Group Smartphone Energy Saving

Size: px
Start display at page:

Download "Dynamic Proxy Selection for Group Smartphone Energy Saving"

Transcription

1 Dynamic Proxy Selection for Group Smartphone Energy Saving Undergraduate Research Final Thesis Presented in Partial Fulfillment of the Requirements for Graduation with Research Distinction in the Undergraduate School of The Ohio State University By Benedict Kok Wei Lee Undergraduate Program in Electrical and Computer Engineering The Ohio State University 2014 Dissertation Committee: Dr. Xiaorui Wang, Advisor

2 Copyright by Benedict Kok Wei Lee 2014

3 Abstract Smartphones and tablets are becoming more and more closely integrated with our daily lives. Smart devices have rapidly substituted traditional computers when it comes to performing certain daily activities such as web-browsing, services, news feed, and etc. However despite the popularity of smart devices in recent years, smart devices continue to have a major critical flaw in their battery life. Several studies had been carried out to optimize energy consumption of individual smartphone through power management (managing GSM, Wi-Fi, and GPS), workload migration (cloud computing), and consolidation (virtual machine). However, unlike previous studies that focus on single phone energy saving methods, we propose a unique method whereby multiple smartphones collaborate to reduce energy consumption. In a phone grouping event, a proxy selection framework is vital to ensure that the workload can be delegated among all users, and that is delegated via a fair system. In this paper, a proxy selection framework is designed to ensure a self-sustained, fair, and efficient system that monitors user s characteristics and performs maintenance operations dynamically. This framework is implemented on real smartphones to experiment on various proxy selection techniques and to verify its overhead and energy saving. Real world traces is used to test the framework on different social activity scenarios. By using this framework, we can save up to 75% of energy in comparison to a normal usage of individual phones. However, there are two main limitations to this framework. The first is that the framework will not i

4 be able to operate with the design of this system as a background app. Secondly, there is also an issue of privacy since usernames and passwords will be passed around between the smartphones. Nevertheless, even though the current study did not demonstrate a promising or reliable usage of this application, it provided some preliminary data for research direction as well as a good motivation and framework for future work. ii

5 Acknowledgments I would like to express my deepest appreciation to Dr. Xiaorui Wang, who had convincingly conveyed a spirit of creativity and adventure in regard to research. His support and persistent help has been my main motivation in order for me to complete my research project. In addition, a huge thank you to everyone at the Power-Aware Computer System (PACS) Laboratory especially Macro Brocanelli for his technical assistance, constructive advice, and moral support. I would also like to thank the College of Engineering at The Ohio State University for giving me the opportunity to pursue my research interest and also the Undergraduate Research Scholarship. I wish to thank Dr. Yuan F. Zheng for being my oral exam committee and his great advices for the future work and improvement for this research. Lastly, a special thanks to my parents Mr. and Ms Lee for their love, support, and encouragement in my study. iii

6 Vita Malaysia Certificate of Education, Ken Hwa High School American Degree Transfer Program, Sunway University College 2012 to present...department of Electrical and Computer Engineer, The Ohio State University Fields of Study Major Field: Electrical and Computer Engineering iv

7 Table of Contents Abstract... i Acknowledgments... iii Vita... iv Table of Contents... v List of Figures... vi Chapter 1: Introduction and Motivation... 1 I. Introduction... 1 II. Motivation... 4 Chapter 2: Methodology... 7 I. Design Protocol... 7 II. Proxy Selection Mode III. Experimental Setup Chapter 3: Results and Discussion I. Proxy Selection Mode II. Client Energy Savings III. Emulation of Group Event Chapter 4: Conclusion and Future Work v

8 List of Figures Figure 1. Top seven apps accessed by 34 users in one year trace study Figure 2. CDF of app active duration for and Facebook... 5 Figure 3. The framework architecture of proxy-client mode... 8 Figure 4. Block diagram of Proxy-Client mode interaction... 9 Figure 5. Proxy selection based on Round-Robin Scheduling Figure 6. Proxy selection based on Notification-Frequency Figure 7. Proxy time slot depending on Battery Percentage Figure 8. CPU power demand with different proxy selection mode Figure 9. WiFi power demand with different proxy selection mode Figure 10. Total power demand with different proxy selection mode Figure 11. Total battery consumption with different proxy selection mode Figure 12. Switching from proxy to client mode shows a significant power reduction Figure 13. Energy comparison of data connections on and off Figure 14. Average of application usage for one year with different user Figure 15. Potential energy savings of five random users during a meeting group event. 24 Figure 16. Potential energy savings of five random users during a party group event vi

9 . Chapter 1: Introduction and Motivation I. Introduction With the rapid development of smartphone technology, public consumers are expecting faster mobile processors, thinner devices, higher screen resolution, and new functionalities with each subsequent release. While processing power and performance of smart devices have been rapidly improving, innovation in battery technology has stagnated. The advancement in so many areas has caused the energy consumption to surpass the potential of battery capability. The effectiveness of energy consumption is one of the largest limiting factors of the future growth of smart devices. A common trick to extend battery life is to disable wireless capabilities such as Wi-Fi, and GPS, when they are not in use. However, being able to constantly connect to the internet has become our daily life essential. Based on real-world trace study, most users waste phone power even though they are not interacting with the device, due to periodic network activities when checking social media notification or downloading new s. Additionally, power is also wasted when users consistently read new but useless notifications. Several research studies discuss the possibility of reducing power consumption through power management (managing GSM, Wi-Fi, and GPS), workload migration (cloud computing), and consolidation (virtual machine). Chon et al. [1] investigate user s daily patterns to predict user behavior, allowing better management of GSM, Wi-Fi, and 1

10 GPS. Workload migration is another common solution used to save energy. Chun et al. [2] investigate on using a combination of static analysis and dynamic profiling to offload partition application to the cloud, thereby optimizing execution time and saving energy. Several studies attempted to use virtual machines to reduce power consumption. Das et al. [3] use a technique known as desktop virtualization to migrate essential computer operations to a server, allowing the user to save energy by switching their desktop to idle. All these previous studies focused on a single phone energy saving methods. Unlike previous studies, this research uses a unique method whereby multiple phones work together to reduce energy consumption. Since user s activities are common across different smartphones, a group of phones could potentially collaborate to reduce overall energy consumption. When a group of people geographically join a particular group event (e.g., meeting, dinner, party), it is most likely that the group may have a lot of similar application and features. The concept of consolidation allows a maximum amount of unused devices to switch to low power mode by migrating similar activity features to a proxy device. The main idea of this research is to select and rotate a user-device (the proxy) to perform the job of checking new notifications for the rest of the devices in the group (the clients), allowing the client to be placed in a lower power state to save battery in a fair and efficient manner. This study is therefore intended to investigate the consolidation process within a group of smartphones to ensure the fairness of task delegation and high energy efficiency. 2

11 Objective This research intends to achieve the following goals: Investigate various proxy selection techniques to maximize energy saving. Develop an algorithm that can rotate the role of the proxy device in a network while maintaining task delegation fairness and energy efficiency Design a proxy selection framework to ensure a self-sustained system that shifts activities processing and performs maintenance operation dynamically. 3

12 # Accesses(thousand) II. Motivation To save energy consumption for a group of smartphones and to improve overall energy efficiency, we first need to determine whether multiple phones have similar activities that may lead to significant energy usage and can be consolidated. Based on a trace study of user activity [4], this trace provides us data about the app access time, duration, and app name of 34 users during one year. Figure 1 shows the popularity of top seven apps of 34 users in one year Apps Accesses in 1 Year by 34 Users Facebook Web Maps Weather Youtube Pandora Figure 1. Top seven apps accessed by 34 users in one year trace study. The access frequency of the top two apps, and Facebook, are almost twice as much as the third place app, web browsing and one magnitude larger than any other apps. In fact, by only focusing on the first two apps, they represent 67% of the user s interactions with the phone, which shows that there is a large possibility that different phones do have common activities. Furthermore, in order to save power consumption, we need to investigate the possibility for phones to offload most of their activities and turn themselves to an even lower power state than default standby power state. Figure 2 4

13 shows the duration of the app when it is active for both and Facebook app to study the user behavior. Figure 2. CDF of app active duration for and Facebook For , about 40% of the activity duration are less than 10 seconds. We set this as the threshold because it is reported by Wasserman [5] that workers delete 106 spam s on a average day and each deletion takes around 10.6 seconds to complete even with spam filter. Not to mention that some s are unimportant or meaningless that the phone could waste more energy if users spend their time checking those s. Thus, if there exists a way to allow users to know that the received is an unimportant before waking the entire phone to receive it, it could leave the phone to sleep longer and further save energy. On the basis of the detailed analysis, we find that (1) and Facebook apps dominate over 67% of the total phone usage which is shown in Figure 1 and (2) about 40% of user interactions with those apps lead to wastage of power consumption which is shown in Figure 2. These findings suggest that it is sufficient to only concentrate on 5

14 consolidating the most popular apps which shows promising results. In summary, we find that multiple phones could have common group features and significant energy saving can be achieved by reducing meaningless operations and let most phones enter into a lower power state. 6

15 Chapter 2: Methodology I. Design Protocol The main idea of this framework is to conserve energy by consolidating the activities of a number different of smartphone into one phone. Before we proceed to the technical details of the framework protocol here are some important definitions: Group event: Collaboration among a group of smartphones that are geographically near to each other to establish a network connection. Proxy-Client Mode: The users enter the proposed model service to prolong their battery life, when a group event is present. Proxy: A selected phone which receives activities to manage from clients. Client: All users that join the group operated under snooze state except for the proxy. Snooze State: A power state that operates with lowest possible CPU power state and basic GSM components. In general, the whole system can be divided into two modes: proxy mode and client mode. In the system, there will only be one smartphone serving as a proxy from time to time while the other smartphones (Clients) operate in a snooze state. The proxy will be responsible for handling communication with the remote servers for each specific app. The whole architecture of the framework is shown below (Figure 3). 7

16 Figure 3. The framework architecture of proxy-client mode There are basically four essential communications protocols in this framework as shown in figure 1 where each step of the protocol is marked with a number label. The first step is to establish a network among the group of smartphone by sending a request message from the proxy phone for service consolidation. The initial network among phones will be established via Bluetooth. The reason Bluetooth is chosen is because it has very low energy consumption overhead in comparison with 4G and WiFi [6]. Even though, Bluetooth communication has a range of about 30 meters only it is still large enough to cover a group location such as a party place or conference room. At this stage, after the Bluetooth pairing of devices is complete the proxy will request for the user (client) phone number, app name, user account, and account password. The proxy will have a log of all its client details stored in the memory which is indexed in a hash table for quick lookup. After all the required data is provided to the proxy, the client will 8

17 be put under snooze state. In this snooze state, the client can still receive message from the proxy. In the second stage, the proxy will handle all the message exchange, services, and notification checking on behalf of the clients using remote services such as WiFi and 4G. The proxy is designed to periodically wake-up to check for new notification based on each account from its clients. The third stage takes place whenever there is new information being pulled from certain apps, whereby the proxy will send a notify message via short message service (SMS) to the target client. By sending the SMS it will wake up the client to inform the user about the new notification, the user can then decide whether to wake up the entire phone to interact with the app or stay in a snooze state. The last step is for the client to rejoin the network by sending a confirmation message to the proxy to resume its status at snooze state. Figure 4. Block diagram of Proxy-Client mode interaction 9

18 II. Proxy Selection Mode The main goal of this research is to investigate various proxy selection methods to produce the most efficient result for group power saving. This proxy selection framework will evaluate several parameters to determine the best phone candidate to operate as a proxy. Currently, several proxy selection techniques have been implemented in this research. These include round robin scheduling, battery level, and notification-frequency schemes. The concept of round robin scheduling is done by rotating proxy responsibilities sequentially through a list that is generated as phones join the group (Figure 5). With this technique, rotation of work among a group of phones can be properly delegated to ensure fairness of workload. Figure 5. Proxy selection based on Round-Robin Scheduling The second technique, the notification-frequency scheme determines the next proxy by selecting the user with the most notifications/ s received in a specific time period (Figure 6). By doing so, we can conserve energy by removing the need to turn on hardware components (e.g. screen display, Wi-Fi, and GPS) for the phone with the most 10

19 frequent notifications. However, in this scheme the role of the proxy would frequently fall on the user with the most notifications/ s. Figure 6. Proxy selection based on Notification-Frequency Finally, the battery level scheme determines the next proxy based solely on the energy left in each phone. The battery level scheme ensures that the next proxy is not at a critical battery level situation. This allows the chosen proxy device to have sufficient energy to maintain the phone s functionalities. Prioritizing the battery level scheme can help prevent disruption of the system. However, a drawback of this scheme is that the user with the highest battery level has to constantly be the proxy. To further improve this scheme we will introduce an implemented version of the battery percentage mode, the new battery percentage mode will change the length of the proxy period depending on the initial battery level (Figure 7). 11

20 Figure 7. Proxy time slot depending on Battery Percentage Different situation will require different proxy selection combination. In order to create an algorithm that selects the appropriate proxy selection mode for the situation, we need to study the effects of different proxy selection mode on the smartphone batteries. 12

21 III. Experimental Setup We will first describe the experimental setup and then describe the results in the next section. We implemented the framework on two phones, Galaxy S2 and Galaxy S3. Two smartphones are sufficient to show the general power consumption of the framework in both proxy and client mode. The Galaxy S2 is equipped with Samsung Exynos 4 Dual 45nm with dual core 1.2GHz CPU and 1GB of RAM. The Galaxy S3 is equipped with Samsung Exynos 4 with quad core 1.4GHz CPU and 1.5GB of RAM. Both devices run Android Jelly Bean 4.3 as their operating system. To collect energy data, we use Monsoon external power meter. The power meter has the capability to measure the amount of real time power consumption of the phone, but it is not capable of measuring particular hardware on the phone. To measure the power and energy consumption of each hardware components used by a specific application, we will be using PowerTutor, an android application. We used these devices to conduct two kinds of experiment with the goal of: (i) describing the main differences between the three proxy selection modes and (ii) showing the variation of proxy energy consumption by increasing the number of phones to check in each cycle. In both experiment the estimated power demand for CPU and Wi-Fi was extracted. To measure the battery level, Android has implemented APIs to retrieve battery level. All these information allow us to analyze and have an exact idea of the amount of energy saved. In the first experiment, we are interested on studying the effects of different proxy selection modes on the smartphone batteries. Each experiment will be 25 minutes long with the initial battery level of GS2 at 100% and GS3 at 40% in all experiments. The 13

22 proxy selection algorithm runs at periodic intervals which is calculated by divifing the event-time by the number of devices (in this case there is only two devices so the proxy selection will take place after 12.5 minutes). The proxy will check for new notifications with a delay of 1 minute from the end of the last check cycle. We set up a test case where GS2 will be receiving one every two minutes, while GS3 will only receive one after 12 minutes of the experiment. There are two reasons to set up the experiment this way: (i) first this allows us to compare notification based mode with the other modes since one user will receives more s than the other, (ii) secondly we can observe the power consumption causes by the SMS notification. Another assumption is GS2 will always start as a proxy for all the experiment. To set up a baseline for comparison among different proxy selection mode, the round-robin proxy selection mode is implemented on both user devices with no new for the whole time period of 25 minutes. This gave us an ideal model to observe the proxy energy consumption solely based on the framework itself without any activity and we call this test no notifications. In the last experiment, because testing the proxy-client model in a real group event may require long experimental times, we use real world user traces to setup two different group events. We use 34 users traces of smartphones recorded for an entire year. These traces were created from a previous research study [4] and are available online in SQL database file. One of these files report how users interact with the phones during each day. The data available are 1) what application the user is opening, 2) the timestamp, and 3) the length of the interaction. In later section we describe in more details how we use these information to emulate group event. 14

23 Chapter 3: Results and Discussion In this section, we evaluate the performance of proxy-client mode considering the synchronization. First we examine the result of power consumption with three proxy selection mode. Then we evaluate the potential energy savings of client mode. Finally, we use real world traces data to setup two case studies and compare the energy usage of smartphones with baselines. I. Proxy Selection Mode The experimental results and evaluate the power consumption of three proxy selection modes (round robin, battery level, and notification frequency) as mention in the previous section is explain in this section. Figure 8 and 9 show the results of CPU, Wi- Fi, and total power consumption of GS2 and GS3 based on different proxy selection mode. Figure 10 shows the consequent battery consumption. Figure 8. CPU power demand with different proxy selection mode 15

24 Figure 9. WiFi power demand with different proxy selection mode. Figure 10. Total power demand with different proxy selection mode. 16

25 Figure 11. Total battery consumption with different proxy selection mode. As shown in the figure, the round-robin mode selects GS2 as the proxy for the first 12.5 minutes and then switches the proxy to GS3 for the next 12.5 minutes. As shown in Figure 11 (comparing no notification and round-robin), sending or receiving new notification does not cause any huge difference in energy consumption. Our hypothesis is that this is because while running under notification frequency mode, the switching of proxy does not necessarily take place. Since the GS2 user receives more s during the first period than the GS3 user, the GS2 remains as the proxy throughout the whole event. Even though notification frequency mode shows the least power consumption, it is unfair to the proxy user since the proxy will be the same throughout the whole event. Lastly, we evaluate the battery percentage mode since GS2 has 60% more battery level than GS3. Therefore GS2 will run as the proxy for 20 minutes instead of only 12.5 minutes, while GS3 run as the proxy for 5 minutes until the group event ends. As a result, at the end of the group event the GS3 shows higher battery level in notification mode 17

26 (during which GS3 was never proxy) as compared to round robin mode. On the other hand, the GS2 consumes more power in notification mode as compared to round robin mode since the proxy period is longer, but does not consume as much power as compared to notification frequency mode since it can take advantage of the snooze state. This ensures a promising fairness system due to two facts: (i) all the smartphone are assign to be the proxy at least one period, and (ii) the length of the period is proportional to the initial battery level. These experiments have showed that the proxy selection for battery percentage algorithm shows best trade-off between battery consumption and fairness among the three proposed algorithm. Most importantly, this experiment shows that the presence of new notifications does not affect the total power consumption of the proxy by very much. The proxy mode shows only a little overhead on the battery consumption since it deplete at most the 0.1% of battery after 15 minutes of notification checking. 18

27 II. Client Energy Savings In this section we will discuss how energy saving can be achieve by using this framework. For this experiment the Monsoon power meter is connected to the power pins of the Samsung Galaxy S3. We will first compare the difference of power consumption between proxy and client mode. For this experiment only one smartphone is sufficient to show the energy savings because each client only communicates with the proxy and each one saves the same amount of energy after joining the framework. We start recording the power consumption with the phone screen off and both Wi-Fi and 4G on. Figure 12 shows the power demand of GS3. The average power consumption of the smartphone is about 379mW over a period of 15 minutes. After 15 minutes, there is a spike in power consumption due to the necessity to turn-on the screen and switch it to client mode (low power by turning off all data connection except for basic GSM). The power consumption after switching to client mode was reduced to about 122mV over 15 minutes period, which corresponds to about 68% in power reduction. Figure 13 shows a comparison of energy consumption of GS3 with and without data capabilities turned on. The two curves are quite linear and the difference in the slope leads to about 70% of energy reduction. These results prove that a client phone can save a lot of energy using this framework during group events. 19

28 Figure 12. Switching from proxy to client mode shows a significant power reduction. Figure 13. Energy comparison of data connections on and off. 20

29 III. Emulation of Group Event In this section, we describe 3 different scenarios and compare the results: Baseline scenario: Normal usage of smartphone with Wi-Fi and 4G data connections connected at all times. Individual scenario: The user turn on data connections to synchronize and check for notifications every 15 minutes, but energy may still be wasted if there is no to update during the synchronization. Proxy-client mode: Phones operate under the proposed consolidation system. To analyze and compare the total energy saving with these 3 scenarios, we will be measuring their performance based on an application. First, we randomly choose one data trace to compare the energy savings between the proxy-client model and the baseline scenario. Then we choose 5 random data traces and we use them to emulate two group events at meeting time (10:00 12:00) and party time (18:00-24:00). First, we use MYSQL to select from the database a random user s interactions for an entire year [4]. In particular we extract the interactions that are shorter than 10 seconds, which as we mentioned in the previous sections, we classify as events that lead to a waste of energy [5]. To clarify, our proxy-client model is built with the intention to minimize this waste. For both baseline and individual scenario, we assume that automatically synchronizes every 15 minutes. However, the baseline scenario will have data capabilities turned on at all times whereas the individual scenario 21

30 will manually turn on data capabilities every 15 minutes to synchronize the and then turn off data afterwards. To calculate the energy consumed, we use the power consumption of Wi-Fi and network data measured with the Monsoon power meter. This information is show in Figure 12. This lets us compare the energy consumed in the baseline scenario with the energy saved by the individual scenario and proxy-client model which turns off data connections between synchronization. Then we take the number of wasteful interactions to further calculate the energy savings of the proxy-client model which would avoid the wasteful synchronization. Figure 14 shows the results in terms of energy usage over the 24 hour day. As shown in the graph, the energy consumption of the proxy-client method is 2J less than the baseline scenario and on average 200mJ less than the individual scenario. The result of the individual scenario compared to the proxy-client method, however, is heavily dependent on the users interaction with the app. The more interactions, the higher the probability of useless interactions which will leads to more savings. Figure 14. Average of application usage for one year with different user 22

31 To evaluate the proxy-client model in a realistic situation, we use the data traces of five random users for one random day of the year. Two different events are created, a meeting between 10:00 to 12:00 and a party between 18:00 to 24:00. During these two time periods we extract the interactions of less than 10 seconds and we calculate the energy savings of the proxy-client method as described in the previous paragraph. We randomly select one of the users to be the proxy (user 5 in meeting and user 3 in party) and we add to the selected user the energy overhead of the proxy calculated in previous section. Figure 15 and 16 shows the results. During the meeting group event, the proxyclient method allows the reduction of on average about 56% of the energy consumption with respect to the baseline scenario and about 7% with respect to the individual scenario. During the party event, the proxy-client method on average is able to reduce about 75% of the energy consumption with respect to the baseline scenario and about 33% with respect to the individual scenario. These results show that the proxy-client method leads to a significant reduction of energy consumption for a group of smartphones, by offloading activities on one single phone. 23

32 Figure 15. Potential energy savings of five random users during a meeting group event. Figure 16. Potential energy savings of five random users during a party group event. 24

33 Chapter 4: Conclusion and Future Work To study the problem of group proxy selection, we propose a consolidation framework within a group of smartphones to reduce overall energy consumption. The consolidation framework is prototyped in two Android devices to test for real user traces and to verify its energy savings. By utilizing a combination of different proxy selection modes, energy savings of up to 75% has been achieved from experimental results, compared to normal usage of individual smartphones. For future experiment, we propose to analyze the minimum overhead requirement of the proxy to ensure no Quality of Service degradation. In addition, a self-sustainable system is needed to monitor the user behavior and performs maintenance operation dynamically. Lastly, as for the privacy concerns, we hope to work on implementing proper security encryption system.. 25

34 References 1. Y. Chon, E. Talipov, H. Shin, and H. Cha, Mobility prediction-based smartphone energy optimization for everyday location monitoring, SenSys, B. Chun, S. Ihm, and P. Maniatis, Clonecloud: Elastic execution between mobile device and cloud, EuroSys, T.Das, P. Padala, and V. N. Padmanabhan, Litegreen: Saving energy in networked desktops using virtualization, Usenix, C. Shepard, A. Rahmati, C. Tossell, L. Zhong, and P. Kortum, Live-lab: measuring wireless networks and smartphone users in the field, SIGMETRICS, T. Wasserman, takes up 28http://mashable.com/2012/08/01/ workers-time/. 6. R. Balani, Energy Consumption Analysis for Bluetooth, WiFi, and Cellular Network. Tech. no. TR-UCLA-NESL Networked & Embedded System Laboratory,

Following statistics will show you the importance of mobile applications in this smart era,

Following statistics will show you the importance of mobile applications in this smart era, www.agileload.com There is no second thought about the exponential increase in importance and usage of mobile applications. Simultaneously better user experience will remain most important factor to attract

More information

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive

More information

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Offloading file search operation for performance improvement of smart phones

Offloading file search operation for performance improvement of smart phones Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Ready Time Observations

Ready Time Observations VMWARE PERFORMANCE STUDY VMware ESX Server 3 Ready Time Observations VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified

More information

Lab - Dual Boot - Vista & Windows XP

Lab - Dual Boot - Vista & Windows XP Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

Clonecloud: Elastic execution between mobile device and cloud [1]

Clonecloud: Elastic execution between mobile device and cloud [1] Clonecloud: Elastic execution between mobile device and cloud [1] ACM, Intel, Berkeley, Princeton 2011 Cloud Systems Utility Computing Resources As A Service Distributed Internet VPN Reliable and Secure

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

DETERMINATION OF THE PERFORMANCE

DETERMINATION OF THE PERFORMANCE DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...

More information

E21 Mobile Users Guide

E21 Mobile Users Guide E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions

More information

CiteSeer x in the Cloud

CiteSeer x in the Cloud Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar

More information

Syllabus Version 2.5_R (04.04.2016)

Syllabus Version 2.5_R (04.04.2016) Syllabus Version 2.5_R (04.04.2016) CMAP-F-Syllabus V2.5_EN, 04.04.2016 Page 1 of 15 0. Introduction to This Syllabus... 4 0.1 Purpose of this document... 4 0.2 Cognitive Levels of Knowledge... 4 0.3 The

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services

Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services K.Lakshmi Narayanan* & Nadesh R.K # School of Information Technology and Engineering, VIT University Vellore, India

More information

NotifyLink Enterprise Edition GroupWise Version White Paper

NotifyLink Enterprise Edition GroupWise Version White Paper NotifyLink Enterprise Edition GroupWise Version White Paper We Link your Wireless Choices Together! Notify Technology Corporation 1054 S. DeAnza Blvd, Suite 105 San Jose, CA 95129 www.notifycorp.com Copyright

More information

Design of Home Automation Framework With Social Network Integration

Design of Home Automation Framework With Social Network Integration Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University

More information

Optimizing Background Email Sync on Smartphones

Optimizing Background Email Sync on Smartphones Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China

More information

Mobile Cloud Computing Challenges

Mobile Cloud Computing Challenges Mobile Cloud Computing Challenges by Kyung Mun - Tuesday, September 21, 2010 http://www2.alcatel-lucent.com/techzine/mobile-cloud-computing-challenges/ Application usage on mobile devices has exploded

More information

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902 Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited

More information

Printer Maestro. True Enterprise Print Management for Windows WHITE PAPER

Printer Maestro. True Enterprise Print Management for Windows WHITE PAPER Printer Maestro True Enterprise Print Management for Windows WHITE PAPER Contents Overview 3 The Printer Maestro Service 4 Installing the Printer Maestro Service 4 Managing the Printer Maestro Service

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Mobile Cloud Computing for Data-Intensive Applications

Mobile Cloud Computing for Data-Intensive Applications Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, vct@andrew.cmu.edu Advisor: Professor Priya Narasimhan, priya@cs.cmu.edu Abstract The computational and storage

More information

AT&T Global Network Client for Android. Version History

AT&T Global Network Client for Android. Version History AT&T Global Network Client for Android Version History Version 4.0.1 June 27, 2016 Upgrade to OpenSSL 1.0.2h Address connectivity issues with attwifi hotspots on some devices Bug Fix: Prevent crash when

More information

A Middleware Strategy to Survive Compute Peak Loads in Cloud

A Middleware Strategy to Survive Compute Peak Loads in Cloud A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk

More information

Realizing the Full Potential of PSM using Proxying

Realizing the Full Potential of PSM using Proxying Realizing the Full Potential of PSM using Proxying Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas 2, Clay Shepard 3, Y. Charlie Hu, Lin Zhong 3 Purdue University, 2 University at Buffalo, SUNY, 3 Rice

More information

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

YZP 480...495: SAUTER Vision Center

YZP 480...495: SAUTER Vision Center YZP 480...495: SAUTER Vision Center SAUTER Vision Center 3.0 - latest-generation modular building management software for energy-efficient buildings The SAUTER Vision Center (SVC) is a web-based building

More information

Performance Analysis of Web-browsing Speed in Smart Mobile Devices

Performance Analysis of Web-browsing Speed in Smart Mobile Devices Performance Analysis of Web-browsing Speed in Smart Mobile Devices Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education, kydman@koreatech.ac.kr Abstract The rapid growth of telecommunication

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Quareo ICM Server Software

Quareo ICM Server Software The Quareo Infrastructure Configuration Manager (ICM) is a server software application designed to document and administer both passive and active network connectivity infrastructure. ICM enables management

More information

Energy Consumption in Android Phones when using Wireless Communication Technologies

Energy Consumption in Android Phones when using Wireless Communication Technologies Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,

More information

Copyright www.agileload.com 1

Copyright www.agileload.com 1 Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate

More information

A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems

A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, and Albert Zomaya Present by Leping Wang 1/25/2012 Outline Background

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

En Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df 0 2 26

En Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df 0 2 26 1 En Wireless Mobile Utility (Android) User s Manual Install the Wireless Mobile Utility on your smart device (smartphone or tablet) to download pictures from a camera or take pictures remotely. The Wireless

More information

Evaluating Impact of Storage on Smartphone Energy Efficiency

Evaluating Impact of Storage on Smartphone Energy Efficiency Evaluating Impact of Storage on Smartphone Energy Efficiency David T. Nguyen College of William and Mary Williamsburg, VA 23185, USA dnguyen@cs.wm.edu Abstract We present an experimental study of how storage

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

Customer Onboarding Guide. How to successfully set up your service 2-9 users

Customer Onboarding Guide. How to successfully set up your service 2-9 users Customer Onboarding Guide How to successfully set up your service 2-9 users 1 Overview Welcome Thank you for choosing RingCentral as your phone system provider. This guide is designed to give you the information

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

What is Eating Up Battery Life On My SmartPhone: A Case Study

What is Eating Up Battery Life On My SmartPhone: A Case Study What is Eating Up Battery Life On My SmartPhone: A Case Study Grace Metri *, Abhishek Agrawal *, Ramesh Peri *, and Weisong Shi Department of Computer Science, Wayne State University, Detroit, Michigan

More information

Development of 10 Gbits/s Traffic Shaper

Development of 10 Gbits/s Traffic Shaper Kenji Anzai, Kenji Yoshinaka, Hiroshi Harada, Koichi Ryu, Masaya Suzuki, Atsushi Saegusa, Masanao Kobayashi, Takayuki Sato, Ryota Watanabe [Summary] We developed the PureFlow GSX-XR as a high-precision

More information

By the Citrix Publications Department. Citrix Systems, Inc.

By the Citrix Publications Department. Citrix Systems, Inc. Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED

More information

Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity

Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. III (May-Jun. 2014), PP 61-66 Bluetooth Messenger: an Android Messenger app based on Bluetooth

More information

Android Phone Controlled Robot Using Bluetooth

Android Phone Controlled Robot Using Bluetooth International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 443-448 International Research Publication House http://www.irphouse.com Android Phone Controlled

More information

An In-vehicle ecall Platform for Efficient Road Safety

An In-vehicle ecall Platform for Efficient Road Safety An In-vehicle ecall Platform for Efficient Road Safety W. Ait-Cheik-Bihi, A. Chariette, M. Bakhouya, A. Nait-Sidi-Moh, J. Gaber, M. Wack Université de Technologie de Belfort-Montbéliard Rue Thierry Mieg,

More information

MAUI: Dynamically Splitting Apps Between the Smartphone and Cloud

MAUI: Dynamically Splitting Apps Between the Smartphone and Cloud MAUI: Dynamically Splitting Apps Between the Smartphone and Cloud Brad Karp UCL Computer Science CS M038 / GZ06 28 th February 2012 Limited Smartphone Battery Capacity iphone 4 battery: 1420 mah (@ 3.7

More information

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008.

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008. Case Study - I Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008 Challenges The scalability of the database servers to execute batch processes under

More information

SERVER SETUP GUIDE CREATED BY JOHN SHEATHER 25 AUGUST 2013. SambaPOS Server Setup Guide V2.0 1 of 25

SERVER SETUP GUIDE CREATED BY JOHN SHEATHER 25 AUGUST 2013. SambaPOS Server Setup Guide V2.0 1 of 25 SERVER SETUP GUIDE CREATED BY JOHN SHEATHER 25 AUGUST 2013 SambaPOS Server Setup Guide V2.0 1 of 25 Table of Contents SambaPOS Server Setup Guide... 3 Equipment used in this setup... 3 Software Used...

More information

Efficient Node Discovery in Mobile Wireless Sensor Networks

Efficient Node Discovery in Mobile Wireless Sensor Networks Efficient Node Discovery in Mobile Wireless Sensor Networks Vladimir Dyo, Cecilia Mascolo 1 Department of Computer Science, University College London Gower Street, London WC1E 6BT, UK v.dyo@cs.ucl.ac.uk

More information

ANDROID PACKET MONITOR

ANDROID PACKET MONITOR University of the western cape ANDROID PACKET MONITOR BACK END CHISHA MALAMA 3/27/2012 2 Contents INTRODUCTION... 3 USER REQUIREMENTS... 4 REQUIREMENTS ANALYSIS... 4 Android touch screen phone... 7 Application

More information

SQL Server Business Intelligence on HP ProLiant DL785 Server

SQL Server Business Intelligence on HP ProLiant DL785 Server SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly

More information

Empirical Examination of a Collaborative Web Application

Empirical Examination of a Collaborative Web Application Empirical Examination of a Collaborative Web Application Christopher Stewart (stewart@cs.rochester.edu), Matthew Leventi (mlventi@gmail.com), and Kai Shen (kshen@cs.rochester.edu) University of Rochester

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

BigFix Power Management. User s Guide

BigFix Power Management. User s Guide July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product names, trade names, trademarks, and logos used

More information

Guidelines for Researching Potential Jurors: Minimizing The Risks Of Leaving Footprints Behind The Problem

Guidelines for Researching Potential Jurors: Minimizing The Risks Of Leaving Footprints Behind The Problem Guidelines for Researching Potential s: Minimizing The Risks Of Leaving Footprints Behind The Problem Introduction As technology evolves, new ways of communicating emerge that cause existing policies and

More information

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Applied Technology Abstract Microsoft SQL Server includes a powerful capability to protect active databases by using either

More information

Microsoft Exchange ActiveSync Administrator s Guide

Microsoft Exchange ActiveSync Administrator s Guide Microsoft Exchange ActiveSync Administrator s Guide Copyright 2005 palmone, Inc. All rights reserved. palmone, HotSync, Treo, VersaMail, and Palm OS are among the trademarks or registered trademarks owned

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida Power Management in Cloud Computing using Green Algorithm -Kushal Mehta COP 6087 University of Central Florida Motivation Global warming is the greatest environmental challenge today which is caused by

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Using the T&D Thermo App with TR-7wf Data Loggers

Using the T&D Thermo App with TR-7wf Data Loggers Using the T&D Thermo App with TR-7wf Data Loggers T&D Thermo The T&D Thermo App from T&D Corporation can be used to accomplish a variety of functions with the TR-7wf Series of Wi-Fi enabled wireless Data

More information

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Pooja H 1, S G Maknur 2 1 M.Tech Student, Dept. of Computer Science and Engineering, STJIT, Ranebennur (India) 2 Head of Department,

More information

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: 1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

SOUTH EAST ASIA AND OCEANIA ERICSSON MOBILITY REPORT JUNE

SOUTH EAST ASIA AND OCEANIA ERICSSON MOBILITY REPORT JUNE SOUTH EAST ASIA AND OCEANIA ERICSSON MOBILITY REPORT JUNE Market Overview Key figures: South East Asia and Oceania 2021 CAGR 2021 Mobile subscriptions (million) 990 1,250 4% Smartphone subscriptions (million)

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Nagpur, Maharashtra, India

Nagpur, Maharashtra, India Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei

More information

Autonomic resource management for the Xen Hypervisor

Autonomic resource management for the Xen Hypervisor Autonomic resource management for the Xen Hypervisor Íñigo Goiri and Jordi Guitart Universitat Politécnica de Catalunya Barcelona, Spain {igoiri,jguitart}@ac.upc.es Abstract Servers workload varies during

More information

Energy Aware Consolidation for Cloud Computing

Energy Aware Consolidation for Cloud Computing Abstract Energy Aware Consolidation for Cloud Computing Shekhar Srikantaiah Pennsylvania State University Consolidation of applications in cloud computing environments presents a significant opportunity

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Mobile App Testing Guide. Basics of Mobile App Testing

Mobile App Testing Guide. Basics of Mobile App Testing 2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and

More information

Parametric Analysis of Mobile Cloud Computing using Simulation Modeling

Parametric Analysis of Mobile Cloud Computing using Simulation Modeling Parametric Analysis of Mobile Cloud Computing using Simulation Modeling Arani Bhattacharya Pradipta De Mobile System and Solutions Lab (MoSyS) The State University of New York, Korea (SUNY Korea) StonyBrook

More information